Data Center 101: Local Area Network Switching

Interestingly enough 2 years ago I couldn’t even begin to post an intelligent blog on Local Area Networking 101, funny how things change. That being said I make no guarantees that this post will be intelligent in any way. Without further ado let’s get into the second part of the Data Center 101 series and discuss the LAN.

I find the best way to understand a technology is to have a grasp on its history and the problems it solves, so let’s take a minute to dive into the history of the LAN. For the sake of simplicity and real world applicability I’m going to stick to Ethernet as it is the predominant LAN technology in today’s data center environments. Before we even go into the history we’ll define Ethernet and where it fits on the OSI model.

Ethernet:

Ethernet is a frame based networking technology which is comprised as a set of standards for Layer 1 and 2 of the OSI model. Ethernet devices use a address called a Media-Access Control Address (MAC) for communication. MAC addresses are a flat address space which is not routable (can only be used on a flat layer 2 network) and is composed of several components most importantly a vendor ID known as an Organizational Unique Identifier (OUI) and a unique address for the individual port.

OSI Model:

The Open-Systems Interconnection (OSI) model is a sub-division of the components of communication that is used as a tool to create interoperable network systems and is a fantastic model for learning networks. The OSI model breaks into 7-Layers much like my favorite taco dip.

Understanding the OSI model and where protocols and hardware fit into it will not only help you learn but also help with understanding new technologies and how they fit together. I often revert back to placing concepts in terms of the OSI model when having highly technical discussions about new concepts and technology. The beauty of the model is that it allows for easy interoperability and flexibility. For instance Ethernet is still Ethernet whether you use Fiber cables or copper cables because only Layer 1 is changing.

Ethernet LAN History:

As the LAN networks we use today evolved they typically started with individual groups within an organization. For instance a particular group would have a requirement for a database server and would purchase a device to connect that group. Those devices were commonly a hub.

Hub:

A network hub is a device with multiple ports used to connect several devices for the purposes of network communication. When an Ethernet hub receives a frame it replicates it to all connected ports except the one it received it on in a process called flooding. All connected devices receive a copy of the frame and will typically only process the frame if the destination MAC address is their own (there are exceptions to this which are beyond the scope of this discussion.)

In the diagram above you see a single device sending a frame and that frame being flooded to all other active ports. This works quite well for small networks consisting of a single hub and low port count, but you can easily see where problems start to arise as the network grows.

Once multiple hubs are connected and the network grows each hub will flood every frame, and all devices will receive these frames regardless of whether they are the intended recipient. This causes major overhead in the network due to the unneeded frames consuming bandwidth.

Bridge:

The next step in the network evolution is called bridging and was designed to alleviate this problem and decrease the overhead of forwarding unneeded frames. A bridge is a device that makes an intelligent decision on when and where to flood frames based on MAC addresses stored in a table. These MAC addresses can be static (manually input) or dynamic (learned on the fly.) Because it is more common we will focus on dynamic. The original bridges were typically 2 or more ports (low port counts) and could separate MAC addresses using the table for those ports.

In the above diagram you see a hub operating normally on the left flooding the frame to all active ports. When the frame is received by the bridge a MAC address lookup is done on the MAC table and the bridge makes a decision whether or not to flood to the other side of the network. Because the frame in this example is destined for a MAC address existing on the left side of the network the bridge does not flood the frame. These addresses will be learned dynamically as devices send frames. If the destination MAC address had been a device on the right side of the network the bridge would have sent the frame to that side to be flooded by the hub.

Bridges reduced unnecessary network traffic between groups or departments while allowing resource sharing when needed. The limitation of original bridges came from the low port counts and changing data patterns. Because the bridges were typically only separating 2-4 networks there was still quite a bit of flooding, especially when more and more resources were shared across groups.

Switches:

Switches are the next evolution of bridges and the operation they perform is still considered bridging. In very basic terms a switch is a high port-count bridge that is able to make decisions on a port-by-port basis. A switch maintains a MAC table and only forwards frames to the appropriate port based on the destination MAC. If the switch has not yet learned the destination MAC it will flood the frame. Switches and bridges will also flood multi-cast (traffic destined for multiple recipients) and broadcast (traffic destined for all recipients) frames which are beyond the scope of this discussion.

In the diagram above I have added several components to clarify switching operations now that we are familiar with basic bridging. Starting in the top left of the diagram you see some of the information that is contained in the header of an Ethernet frame. In this case it is the source and destination MAC addresses of two of the devices connected to the switch. Each end-point in the above diagram is labeled with a MAC address starting with AF:AF:AF:AF:AF. In the top right we see a representation of a MAC table which is stored on the switch and learned dynamically. The MAC table contains a listing of which MAC addresses are known to be on each port. Because the MAC table in this example is fully populated we can assume that the switch has previously seen a frame from each device in order to populate the table. That auto population is the ‘dynamic learning’ and it is done be recording the source MAC address of incoming frames. Lastly we see that the frame being sent by the device on port 1 is only being forwarded to the device on port 2. In the event port 2’s MAC address had not yet been learned the switch would be forced to flood the frame to all ports except the one it received it on in order to ensure it was received by the destination device.

So far we’ve learned that bridges improved upon hubs, and switches improved upon basic bridging. The next kink in the evolution of Ethernet LANs came as our networks grew beyond single switches and we began adding in redundancy.

The three issues that arose can all be grouped as problems with network loops (specifically Layer 2 Ethernet loops.) These issues are:

Multiple Frame Copies:

When a device receives the same frame more than once due to replication or loop issues it is a multiple frame copy. This can cause issues for some hardware and software and also consumes additional unnecessary bandwidth.

MAC Address Instability:

When a switch must repeatedly change its MAC table entry for a given device this is considered MAC address instability.

Broadcast Storms:

Broadcast storms are the most serious of the three issues as they can literally bring all traffic to a halt. If you ask someone who has been doing networking for quite some time how they troubleshoot a broadcast storm you are quite likely to hear ‘Unplug everything and plug things back in one at a time until you find the offending device.’ The reason for this is that in the past the storm itself would soak up all available bandwidth leaving no means to access switching equipment in order to troubleshoot the issue. Most major vendors now provide protection against this level of problem but storms are still a serious problem that can have a major performance impact on production data. Broadcast storms are caused when a broadcast, multi-cast or flooded frame is repeatedly forwarded and replicated by one or more switches.

In the diagram above we can see a switched loop. We can also observe several stages of frame forwarding starting with the device 1 in the top left sending a frame to the device 2 in the top right.

Device 1 forwards a frame to device 2. This one-to-one communication is known as unicast.

The switch on the top left does not yet have device 2 in its MAC table therefore it is forced to flood the frame, meaning replicate the frame to all ports except the one where it was received.

In stage three we see two separate things occur:

The switch in the top right delivers the frame to the intended device (for simplicities sake we are assuming the switch in the top right already has a MAC table entry for the device.)

The bottom switch having received the frame forwards the frame to the switch in the top right.

The switch in the top right receives the second copy and forwards it based on MAC table delivering the second copy of the same frame to device 2.

The above example has a little more going on and can become confusing quickly. For the purposes of this example assume all three switches have blank MAC address tables with no devices known. Also remember that they are building the MAC table dynamically based on the source MAC address they see in a frame. To aid in understanding I will fill out the MAC tables at each step.

1. Our first stage is the easy one. Device 1 forwards a unicast frame to device 2. Switch A receives this frame on the top port.

2. When switch A receives the frame it checks its MAC table for the correct port to forward frames to device 2. Because its MAC table is currently blank it must flood the frame (replicate it to all ports except the one where it was received.) As it floods the frame it also records the MAC address and attached port of device 1 because it has seen this MAC as the source in the frame.

3. In stage 3 two switches receive the frame and must make decisions.

Switch C having a blank MAC table must flood the frame. Because there is only one port other than the one it received it on switch C floods the frame to the only available port, at the same time it records the source MAC address as having been received on its port 1.

Switch B also receives the frame from switch A, and must make a decision. Like switch C, switch B has no records in its MAC table and must flood the frame. It floods the frame down to switch B, and up to device 2. At the same time switch B records the source MAC in its MAC table.

4. In the fourth stage we again have several things happening.

Switch C has received the same frame for the second time, this time from port 2. Because it still has not seen the destination device it must flood the frame. Additionally because this is the exact same frame switch C sees the MAC address of device 1 coming from its right port, port 2, and assumes the device has moved. This forces switch C to change it’s MAC table.

At the same time Switch B receives another copy of the frame. Switch B seeing the same source address must change its MAC table and because it still does not have the destination MAC in the table it must flood the frame again.

In the above diagram pay close attention to the fact that the MAC tables have been changed for switch B and C. Because they saw the same frame come from a different port they must assume the device has moved and change the table. Additionally because the cycle has not been completed the loop will continue and this is one way broadcast storms begin. More and more of these endless loops hit the network until there is no bandwidth left to serve data frames.

In this simple example it may seem that the easy solution is to not build loops like the triangle in my diagram. This is actually the premise of the next Ethernet evolution we’ll discuss, but first let’s look at how easy it is to create loops just by adding redundancy.

In the diagram above we start with a non-redundant switch link. This link is a single point of failure and in the event a component fails devices on separate switches will be unable to communicate. The simple solution is adding a second port for redundancy, with the assumed added benefit of having more bandwidth. In reality without another mechanism in place adding the second link turns the physical view on the bottom left into the logical view on the bottom right which is loop. This is where the next evolution comes into play.

Spanning-Tree Protocol (STP):

STP is defined in IEEE 802.1d and provides an automated method for building loop free topologies based on a very simple algorithm. The premise is to allow the switches to automatically configure a loop free topology by placing redundant links in a blocked state. Like a tree this loop free topology is built up from the root (root bridge) and branches out (switches) to to the leaves (end-nodes) with only one path to get to each end-node.

The way Spanning-tree does this is by detecting redundant links and placing them in a ‘blocked’ state. This means that the ports do not send or receive frames. In the event of a primary link failure (designated port) the blocked port is brought online. The issue with spanning-tree is two fold:

Because it blocks ports to prevent loops potential bandwidth is wasted.

In failure events Spanning-Tree can take up to 50 seconds to bring the blocked port into an active state, this means there is a potential of 50 seconds of down time for the link.

Multiple versions of STP have been implemented and standardized to improve upon the original 802.1d specification. These include:

Uses additional port-types not in the original STP specification to allow faster convergence during failure events.

Per-VLAN Rapid Spanning-Tree (PVRSTP):

Provides rapid spanning-tree functionality on a per VLAN basis.

Other STP implementations exist and the details of STP operation in each of its flavors is beyond the scope of what I intend to cover with the 101 series. If there is a demand these concepts may be covered in a more in-depth 202 series once this series is completed.

Summary:

Ethernet networking has evolved quite a bit over the years and is still a work in progress. Understanding the how’s and why’s of where we are today will help in understanding the advancements that continue to come. If you have any comments, questions, or corrections please leave them in the comments or contact me in any of the ways listed on the about page.

hi!,I like your writing very much! proportion we communicate more approximately
your article on AOL? I require a specialist on this area to solve my problem.
May be that’s you! Looking ahead to look you.

Actually, the problems that can be caused by traditional chemical products can be
enormous. Many mothers today work outside the home in addition to raising children, and sometimes housework suffers as a result.

While you schedule your work, make sure that you make allowance for
cleaning different parts of the house on different days.

Apply it to a soft cloth and use it to wipe down woodwork and furniture.
Will you need the cleaning service to do a thorough cleaning
for you. You don’t want to be inhaling dust or preparing
food on dirty, contaminated surfaces.

Remember that people trust real address workplaces more than online ventures because contact with the business is more real.
It is an extremely versatile product that is inexpensive and
helps cut back on the use of expensive chemicals.
Most of the companies that offer apartment cleaning
services are bonded and insured so that if any accident were to happen they will take full responsibility for the
replacement.

Before you start calling properties and getting estimates, you may need to find out what you need
cleaned. This lets them know how they have done and it helps them to improve their cleaning.
Most of the companies that offer apartment cleaning services are
bonded and insured so that if any accident were to happen they will take full responsibility
for the replacement.

These are the right size for most cleaning jobs,
very absorbent, lint free, and best of all
reusable. Many mothers today work outside
the home in addition to raising children, and sometimes housework suffers as a result.
Most of the companies that offer apartment cleaning services are bonded and insured so that
if any accident were to happen they will take full responsibility for the replacement.

These are the right size for most cleaning jobs, very absorbent, lint free, and best of all reusable.
The places that are found in this lovely area are there for
the convenience of the customers. These mops can be a bit pricey initially, but over time will add up to hundreds of dollars in savings on floor products, especially if you have many types of
flooring.

Before you start calling properties and getting estimates, you
may need to find out what you need cleaned. It is
an extremely versatile product that is inexpensive and helps
cut back on the use of expensive chemicals. Most of the companies that offer
apartment cleaning services are bonded and insured so that if any accident were to happen they will take full
responsibility for the replacement.

Another must-have piece of equipment is a cell phone to enable easy
response to your customers. You can also keep containers of various colors
and sizes in different rooms. You don’t want
to be inhaling dust or preparing food on dirty, contaminated surfaces.

Before you start calling properties and getting estimates, you may need
to find out what you need cleaned. Many mothers today work outside the home
in addition to raising children, and sometimes housework suffers as a result.
These mops can be a bit pricey initially, but over time will add up to hundreds of dollars in savings on floor products, especially if you have many types of flooring.

These are the right size for most cleaning jobs, very absorbent,
lint free, and best of all reusable. Finally, I think parents and grandparents
need to make it clear to students that keeping the
apartment clean is a personal health issue. Regardless of
whether you have a 3 bedroom apartment home or a studio, your place will
get dirty.

These are the right size for most cleaning jobs, very
absorbent, lint free, and best of all reusable. There is no limit on what you earn – Once you have made a good base of clients, you
will see that you can earn as much as you want. Equipment should also be serviced on a weekly basis to
make them more efficient.

Apply it to a soft cloth and use it to wipe down woodwork and furniture.
You can also keep containers of various colors and
sizes in different rooms. To begin with, you would need an office, some people who will clean the apartments and also
some cleaning equipments.

4) One Cleaning Supply at a Time – Instead of cleaning one room top to
bottom then moving onto the next on cleaning day, pull out one cleaning supply and use it everywhere you need to in your home.
Finally, I think parents and grandparents
need to make it clear to students that keeping the apartment clean is a personal health issue.

To begin with, you would need an office, some people
who will clean the apartments and also some cleaning equipments.

Remember that people trust real address workplaces more than online ventures because contact with
the business is more real. Finally, I think parents and grandparents
need to make it clear to students that keeping the apartment clean is
a personal health issue. Is there anything special that the cleaning service needs to know about.

Before you start calling properties and getting estimates, you may need to find out what you need cleaned.
When apartments get the unit “make ready” for the next tenant,
they usually employ a cleaning service to complete this.
You don’t want to be inhaling dust or preparing food on dirty,
contaminated surfaces.

If you have the tendency to horde things, you will have to
learn let go. There is no limit on what you earn – Once you have made a
good base of clients, you will see that you can earn as much as
you want. Regardless of whether you have a 3 bedroom apartment home or a studio, your place will get dirty.

Before you start calling properties and getting estimates, you may
need to find out what you need cleaned. Many mothers today work outside the home in addition to raising
children, and sometimes housework suffers as a result.

Regardless of whether you have a 3 bedroom apartment home or a studio, your place will get dirty.

Another must-have piece of equipment is a cell phone to
enable easy response to your customers. You can also keep containers of
various colors and sizes in different rooms.
There are a couple of excellent e-courses available that give
a lot of really valuable information on how to structure your business,where and how
to get clients, how to calculate prices, what equipment and supplies are needed etc, and in my
opinion are well worth the $30 or $40 they cost.

If you have the tendency to horde things, you will have to learn let go.

Finally, I think parents and grandparents need to make it clear to students that keeping the apartment clean is a personal
health issue. Regardless of whether you have a 3 bedroom apartment home or a studio, your
place will get dirty.

Another must-have piece of equipment is a cell phone to enable easy response to your customers.
Will you need the cleaning service to do a thorough cleaning for you.
While you schedule your work, make sure that you make allowance for cleaning different parts of the house on different days.

Apply it to a soft cloth and use it to wipe down woodwork and furniture.

It is an extremely versatile product that is inexpensive
and helps cut back on the use of expensive chemicals. These mops can be a bit pricey initially, but
over time will add up to hundreds of dollars in savings on floor products, especially if you have many
types of flooring.

Before you start calling properties and getting estimates, you may need to find out what
you need cleaned. When apartments get the unit “make ready”
for the next tenant, they usually employ a cleaning service to complete this.
These mops can be a bit pricey initially, but over time will add up to hundreds of dollars in savings on floor products,
especially if you have many types of flooring.

You can choose your own timings and above all, you can choose how much work you want to take
up. There is no limit on what you earn – Once you have made a good base of
clients, you will see that you can earn as much as you want.
Is there anything special that the cleaning service needs to know about.

Another must-have piece of equipment is a cell phone
to enable easy response to your customers. There is no limit on what you earn – Once you have
made a good base of clients, you will see that you can earn as much as you want.
You don’t want to be inhaling dust or preparing food on dirty, contaminated surfaces.

If you have the tendency to horde things, you will have to learn let go.
Many mothers today work outside the home in addition to raising children, and sometimes housework
suffers as a result. Most of the companies that offer
apartment cleaning services are bonded and insured
so that if any accident were to happen they will take full responsibility for the replacement.

4) One Cleaning Supply at a Time – Instead of cleaning one room
top to bottom then moving onto the next on cleaning day, pull out one cleaning supply and
use it everywhere you need to in your home. The places that are found in this lovely area are
there for the convenience of the customers. There are
a couple of excellent e-courses available that
give a lot of really valuable information on how to structure your business,where and how to get
clients, how to calculate prices, what equipment and supplies
are needed etc, and in my opinion are well worth the $30 or $40 they
cost.